


default search action
Yin Pan
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j8]Jinfang Xie, Zhi Zeng
, Yue Ma, Yin Pan, Xinlin Wu, Xiaoyan Han, Yibin Tian:
Defect recognition in sonic infrared imaging by deep learning of spatiotemporal signals. Eng. Appl. Artif. Intell. 133: 108174 (2024) - [c27]Peter Willis
, Nirmala Shenoy
, Yin Pan
, Bill Stackpole
:
Investigating Data Center Network Protocols. ANRW 2024 - [c26]Peter Willis, Nirmala Shenoy, John F. Hamilton, Yin Pan:
Resiliency in Networks Through Meshed Trees. NoF 2024: 45-53 - [c25]Peter Willis, Nirmala Shenoy, Yin Pan, Bill Stackpole, John F. Hamilton:
New Techniques to Route in Folded-Clos Topology Data Center Networks. SC Workshops 2024: 819-828 - 2023
- [c24]Qin Yan
, Yin Pan
:
Analysis of digital technology-based building safety and sustainable development. APIT 2023: 135-140 - 2022
- [j7]Xi Chen
, Danyang Song, Yongyi Shou, Yin Pan:
Altruism or social motives? evidence from online charitable giving in China. Enterp. Inf. Syst. 16(4): 566-588 (2022) - [c23]Peter Willis, Nirmala Shenoy, Yin Pan
, John F. Hamilton:
A Novel Frame Forwarding Algorithm for Switched Networks. LCN 2022: 220-226 - 2021
- [j6]Zhanzhi Wan, Tiejun Zhou, Zhili Tang, Yin Pan, Lingfei Zhang:
Smart Design for Evacuation Signage Layout for Exhibition Halls in Exhibition Buildings Based on Visibility. ISPRS Int. J. Geo Inf. 10(12): 806 (2021) - 2020
- [c22]Rayan Mosli, Matthew Wright
, Bo Yuan, Yin Pan
:
They Might NOT Be Giants Crafting Black-Box Adversarial Examples Using Particle Swarm Optimization. ESORICS (2) 2020: 439-459 - [c21]Peter Willis, Nirmala Shenoy, Yin Pan
, John F. Hamilton:
Root Redundancy in Meshed Tree Bridged Networks. LCN 2020: 297-308
2010 – 2019
- 2019
- [j5]Zhenfeng Shao, Yin Pan
, Chunyuan Diao
, Jiajun Cai
:
Cloud Detection in Remote Sensing Images Based on Multiscale Features-Convolutional Neural Network. IEEE Trans. Geosci. Remote. Sens. 57(6): 4062-4076 (2019) - [i1]Rayan Mosli, Matthew Wright, Bo Yuan, Yin Pan:
They Might NOT Be Giants: Crafting Black-Box Adversarial Examples with Fewer Queries Using Particle Swarm Optimization. CoRR abs/1909.07490 (2019) - 2018
- [j4]Rayan Mosli, Bo Yuan, Yin Pan
:
On the viability of data collection using Google Rapid Response for enterprise-level malware research. Digit. Investig. 26 Supplement: S139 (2018) - 2017
- [c20]Rayan Mosli, Rui Li, Bo Yuan, Yin Pan
:
A Behavior-Based Approach for Malware Detection. IFIP Int. Conf. Digital Forensics 2017: 187-201 - [c19]Junho Cho, Xi Chen, S. Chandrasekhar, Gregory Raybon, Ronen Dar, Laurent Schmalen, Ellsworth C. Burrows, Andrew Adamiecki, Stephen Corteselli, Yin Pan, Diego Correa, Bradley McKay, Zsigmond Szilárd, Peter J. Winzer, Steve Grubb:
Trans-Atlantic field trial using probabilistically shaped 64-QAM at high spectral efficiencies and single-carrier real-time 250-Gb/s 16-QAM. OFC 2017: 1-3 - [c18]Yin Pan
, Sumita Mishra
, David I. Schwartz
:
Gamifying Course Modules for Entry Level Students. SIGCSE 2017: 435-440 - 2016
- [j3]Xi Chen
, Yin Pan, Bin Guo:
The influence of personality traits and social networks on the self-disclosure behavior of social network site users. Internet Res. 26(3): 566-586 (2016) - 2014
- [c17]Yin Pan, Xi Chen, Shun Cai, Yi Dong:
Understanding Social Network sites continuance Intention from a Self-Disclosure and Social Capital Perspective. PACIS 2014: 44 - 2013
- [c16]Kaiqi Xiong
, Yin Pan:
Understanding ProtoGENI in Networking Courses for Research and Education. GREE 2013: 119-123 - 2012
- [c15]Yin Pan, Sumita Mishra
, Bo Yuan, Bill Stackpole, David I. Schwartz
:
Game-based forensics course for first year students. SIGITE Conference 2012: 13-18 - [c14]Aaron Sanders, Tong Sun, Yin Pan, Bo Yuan:
Correlating Risk Findings to Quantify Risk. SocialCom/PASSAT 2012: 752-759 - 2010
- [c13]David Pearson, Sumita Mishra, Yin Pan:
Security Attacks And Defenses In Sensor Networks. Security and Management 2010: 286-292 - [c12]Michael Robertson, Yin Pan, Bo Yuan:
A social approach to security: Using social networks to help detect malicious web content. ISKE 2010: 436-441
2000 – 2009
- 2009
- [c11]Tae H. Oh, Sumita Mishra
, Yin Pan:
Teaching high-assurance internet protocol encryption (haipe) using opnet modeler simulation tool. SIGITE Conference 2009: 161-165 - [c10]Yin Pan:
Services for deploying web-based online courses. SOLI 2009: 311-316 - 2008
- [c9]Scott Pudlewski
, Nirmala Shenoy, Yamin Al-Mousa, Yin Pan, John Fischer:
A hybrid Multi Meshed Tree routing protocol for wireless ad hoc networks. MASS 2008: 635-640 - [c8]Bill Stackpole, Jason Koppe, Thomas Haskell, Laura Guay, Yin Pan:
Decentralized virtualization in systems administration education. SIGITE Conference 2008: 249-254 - 2007
- [c7]Yin Pan:
Security auditing course development. SIGITE Conference 2007: 259-266 - 2005
- [c6]Nirmala Shenoy, Yin Pan, Darren Narayan, David Ross, Carl Lutzer:
Route robustness of a multi-meshed tree routing scheme for Internet MANETs. GLOBECOM 2005: 6 - [c5]Nirmala Shenoy, Yin Pan, Vishal Gogula Reddy:
Bandwidth reservation and QoS in Internet MANETs. ICCCN 2005: 353-358 - [c4]Nirmala Shenoy, Yin Pan:
Multi-meshed tree routing for Internet MANETs. ISWCS 2005: 145-149 - [c3]Nirmala Shenoy, Yin Pan, Vishal Gogula Reddy:
Quality of service in Internet MANETs. PIMRC 2005: 1823-1829 - 2004
- [c2]Luther Troell, Yin Pan, Bill Stackpole:
Forensic course development: one year later. SIGITE Conference 2004: 50-55 - 2003
- [c1]Luther Troell, Yin Pan, Bill Stackpole:
Forensic course development. CITC 2003: 265-269
1990 – 1999
- 1997
- [j2]Yin Pan, George J. Klir:
Bayesian Inference Based on Interval-Valued Prior Distributions and Likelihoods. J. Intell. Fuzzy Syst. 5(3): 193-203 (1997) - 1993
- [j1]Bo Yuan, Yin Pan:
Generalized fuzzy method-of-cases. Int. J. Approx. Reason. 9(2): 129-138 (1993)
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-03-04 21:22 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint